System Offenses; What Is A System Offense; How Do I Investigate A System Offense - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1 Manual

Category offense investigation guide
Hide thumbs Also See for SECURITY THREAT RESPONSE MANAGER 2008.2 - CATEGORY OFFENSE INVESTIGATION GUIDE REV 1:
Table of Contents

Advertisement

13
What is a System
Offense?
How do I
Investigate a
System Offense?
Step 1
Step 2
S
O
YSTEM
This chapter provides information on system offenses including:

What is a System Offense?

How do I Investigate a System Offense?

How do I Tune a System Offense?
An important component of a network security solution is monitoring the health
status of the hosts and connected devices. The possibility of a critical network
device or vital component of your network malfunctioning is a serious threat to your
network's security. STRM monitors system logs from security devices, network
devices, and host computers.
STRM generates a system offense when a host or device on your network reaches
a critical system state. By analyzing system logs from all supported devices, STRM
can accurately determine when a system has reached a critical state, potentially
leaving the network vulnerable or inoperable.
To investigate a system offense:
Click the Offense Manager tab.
The Offense Manager window appears.
Click By Category from the navigation menu.
The By Category view appears displaying high-level categories. The counts for
each category are accumulated from the values in the low-level categories.
Hint: Only low-level categories with associated offenses appear with an arrow.
You can click the arrow to view the associated low-level categories. If you wish to
view all categories, click Show Inactive Categories.
Offense Category Investigation Guide
FFENSES

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents